- Products
- Learn
- Local User Groups
- Partners
- More
Stop Babysitting Rules.
Go Agentic
Step Into the Future of
AI-Powered Cyber Security
The State of Ransomware Q1 2026
Key Trends and Their Impact
AI Security Masters E8:
Claude Mythos: New Era in Cyber Security
Blueprint Architecture for Securing
The AI Factory & AI Data Center
Call For Papers
Your Expertise. Our Stage
CheckMates Go:
CheckMates Fest
We see this on an R81.10 gateway:
| Error: 'URL Filtering' is not responding. Verify that 'URL Filtering' is installed on the gateway. If 'URL Filtering' should not be installed verify that it is not selected in the Products List of the gateway (SmartDashboard > Gateway > General Properties > Check Point Products List). This error may occur if the Security Cluster is in Multi-Version Cluster mode. After upgrading all the cluster members to the same version, this error should disappear. |
| Error: 'Identity Awareness' is not responding. Verify that 'Identity Awareness' is installed on the gateway. If 'Identity Awareness' should not be installed verify that it is not selected in the Products List of the gateway (SmartDashboard > Gateway > General Properties > Check Point Products List). This error may occur if the Security Cluster is in Multi-Version Cluster mode. After upgrading all the cluster members to the same version, this error should disappear. |
| Error: 'Application Control' is not responding. Verify that 'Application Control' is installed on the gateway. If 'Application Control' should not be installed verify that it is not selected in the Products List of the gateway (SmartDashboard > Gateway > General Properties > Check Point Products List). This error may occur if the Security Cluster is in Multi-Version Cluster mode. After upgrading all the cluster members to the same version, this error should disappear. |
Output from 'fw stat' and 'enabled_blades':
[Expert@gateway:0]# fw stat
HOST POLICY DATE
localhost Perimeter 7Feb2024 16:06:12 : [>eth0] [<eth0] [>eth1] [<eth1] [>vpnt200] [<vpnt200] [>vpnt201] [<vpnt201] [>vpnt100] [<vpnt100] [>vpnt101] [<vpnt101]
[Expert@gateway:0]# enabled_blades
fw vpn urlf av appi ips identityServer SSL_INSPECT anti_bot content_awareness mon
We see logs for all three blades on this gateway:
So I'm thinking this is cosmetic but the OCD in me doesn't like seeing the splats on the overview page. Also, this survives a reboot.
Anyone have any helpful suggestions?
I saw this few times in my labs before (on different versions) and way I fixed it was simply by installing policy and also database from smart console. Not sure if its cosmetic, but if blades are enabled and functioning, seems like it could be.
Best,
Andy
You running VSX? You cannot have those blades enabled in vs0 -> https://support.checkpoint.com/results/sk/sk106496
Hello, thank you for your reply, we are not running VSX.
When did you notice this? Any changes recently? ie upgrade, policy change, any other blades?
Best,
Andy
It has been this way for several months but I haven't been too worked up about it because it seemed to be cosmetic. I did try disabling the blades, install database, enable the blades and install database just prior to a service window to change affinity for CoreXL (which requires a reboot). When the gateway came up from reboot the Identity Awareness blade error went away but the other two still show the error.
One easy fix (if it works of course) wuld be to disable those blades, install policy, re-enable, install policy again. No guarantee, but easy to try.
Best,
Andy
Hello,
Unless I'm missing something, it isn't that easy to do without re-writing my rulebase to remove dependencies for rules written on those blades?
Only way to know would be to uncheck it, save and see if it complains about anything.
Best,
Andy
I think it will give messages if you disable blades that are in 'use'
Maybe we should focus on the mgmt and not gateways? Have you rebooted FWMGT?
Maybe this SK helps:
https://support.checkpoint.com/results/sk/sk111944
Thats good sk to follow, agree.
Andy
reboot mgmt fixed the issue for me last week
I always found rebooting the gateway fixed it for me, but does not hurt to reboot the mgmt, for sure...no downtime needed.
Best,
Andy
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 20 | |
| 19 | |
| 9 | |
| 9 | |
| 8 | |
| 7 | |
| 6 | |
| 6 | |
| 4 | |
| 4 |
Fri 29 May 2026 @ 09:00 AM (EDT)
Caracas: Executive Breakfast: Innovación en Ciberseguridad – IA y Threat IntelligenceTue 02 Jun 2026 @ 10:00 AM (AEST)
The Cloud Architect Series: Check Point WAF. The next generation of AI-Powered Protection - APACTue 02 Jun 2026 @ 06:00 PM (IDT)
Under the Hood | Check Point SASE: Identity Integration & Access Policy Design Best PracticesTue 02 Jun 2026 @ 10:00 AM (AEST)
The Cloud Architect Series: Check Point WAF. The next generation of AI-Powered Protection - APACTue 02 Jun 2026 @ 06:00 PM (IDT)
Under the Hood | Check Point SASE: Identity Integration & Access Policy Design Best PracticesThu 04 Jun 2026 @ 02:00 PM (CEST)
Deep Dive Webinar: New CloudGuard GWLB Deployment Without NAT Gateways - EuropeThu 04 Jun 2026 @ 07:00 PM (IDT)
Deep Dive Webinar: New CloudGuard GWLB Deployment Without NAT Gateways - AmericaFri 12 Jun 2026 @ 10:00 AM (CEST)
CheckMates Live Netherlands - Sessie 47: Continuous Threat Exposure ManagementFri 29 May 2026 @ 09:00 AM (EDT)
Caracas: Executive Breakfast: Innovación en Ciberseguridad – IA y Threat IntelligenceAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY